Cooperative Secure Transmission by Exploiting Social Ties in Random Networks
暂无分享,去创建一个
[1] Huiming Wang,et al. Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks , 2012, IEEE Transactions on Signal Processing.
[2] Tony Q. S. Quek,et al. Trust Degree Based Beamforming for MISO Cooperative Communication System , 2015, IEEE Communications Letters.
[3] Kai-Kit Wong,et al. Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays , 2011, IEEE Transactions on Signal Processing.
[4] Zaher Dawy,et al. Social Network Aware Device-to-Device Communication in Wireless Networks , 2015, IEEE Transactions on Wireless Communications.
[5] Hao Chen,et al. Social Tie Based Cooperative Jamming for Physical Layer Security , 2015, IEEE Communications Letters.
[6] Dusit Niyato,et al. Applications, Architectures, and Protocol Design Issues for Mobile Social Networks: A Survey , 2011, Proceedings of the IEEE.
[7] Zaher Dawy,et al. A Social-Aware Framework for Efficient Information Dissemination in Wireless Ad Hoc Networks , 2017, IEEE Communications Magazine.
[8] Victor C. M. Leung,et al. A Survey on Mobile Social Networks: Applications, Platforms, System Architectures, and Future Research Directions , 2015, IEEE Communications Surveys & Tutorials.
[9] Donald F. Towsley,et al. Multi-Antenna Transmission With Artificial Noise Against Randomly Distributed Eavesdroppers , 2015, IEEE Transactions on Communications.
[10] Qian Yang,et al. Cooperative Transmission for Physical Layer Security by Exploring Social Awareness , 2017, 2017 IEEE Globecom Workshops (GC Wkshps).
[11] Huiming Wang,et al. Enhancing wireless secrecy via cooperation: signal design and optimization , 2015, IEEE Communications Magazine.
[12] Jeffrey G. Andrews,et al. A primer on spatial modeling and analysis in wireless networks , 2010, IEEE Communications Magazine.
[13] Huiming Wang,et al. Hybrid Cooperative Beamforming and Jamming for Physical-Layer Security of Two-Way Relay Networks , 2013, IEEE Transactions on Information Forensics and Security.
[14] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[15] Feng Liu,et al. Joint Cooperative Beamforming, Jamming, and Power Allocation to Secure AF Relay Systems , 2015, IEEE Transactions on Vehicular Technology.
[16] Huiming Wang,et al. Joint Cooperative Beamforming and Jamming to Secure AF Relay Systems With Individual Power Constraint and No Eavesdropper's CSI , 2013, IEEE Signal Processing Letters.
[17] Sinan Aral,et al. Identifying Influential and Susceptible Members of Social Networks , 2012, Science.
[18] Jeffrey G. Andrews,et al. On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks , 2010, IEEE Transactions on Wireless Communications.
[19] Wan Choi,et al. Enhanced Secrecy in Stochastic Wireless Networks: Artificial Noise With Secrecy Protected Zone , 2014, IEEE Transactions on Information Forensics and Security.
[20] Stefano Chessa,et al. Empowering mobile crowdsensing through social and ad hoc networking , 2016, IEEE Communications Magazine.
[21] Huiming Wang,et al. Hybrid Opportunistic Relaying and Jamming With Power Allocation for Secure Cooperative Networks , 2015, IEEE Transactions on Wireless Communications.
[22] Il-Min Kim,et al. Optimal Cooperative Jamming for Multiuser Broadcast Channel with Multiple Eavesdroppers , 2013, IEEE Transactions on Wireless Communications.
[23] Xu Chen,et al. Exploiting Social Ties for Cooperative D2D Communications: A Mobile Social Networking Case , 2015, IEEE/ACM Transactions on Networking.
[24] Sheng Chen,et al. Social-Aware Resource Allocation for Device-to-Device Communications Underlaying Cellular Networks , 2015, IEEE Wireless Communications Letters.
[25] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[26] Li Wang,et al. Cooperative Jamming-Aided Secrecy Enhancement in P2P Communications With Social Interaction Constraints , 2017, IEEE Transactions on Vehicular Technology.
[27] Ning Ge,et al. Joint Social-Position Relationship Based Cooperation Among Mobile Terminals , 2014, IEEE Communications Letters.
[28] Qiang Li,et al. Cooperative Secure Beamforming for AF Relay Networks With Multiple Eavesdroppers , 2013, IEEE Signal Processing Letters.
[29] Kun Yang,et al. Mobile Social Networks: Architectures, Social Properties, and Key Research Challenges , 2013, IEEE Communications Surveys & Tutorials.
[30] Tony Q. S. Quek,et al. Confidential Cooperative Communication With Trust Degree of Potential Eavesdroppers , 2016, IEEE Transactions on Wireless Communications.
[31] Sheng Chen,et al. Social-aware D2D communications: qualitative insights and quantitative analysis , 2014, IEEE Communications Magazine.
[32] Robert W. Heath,et al. Modeling heterogeneous network interference , 2012, 2012 Information Theory and Applications Workshop.
[33] Hui-Ming Wang,et al. Destination Assisted Jamming and Beamforming for Improving the Security of AF Relay Systems , 2017, IEEE Access.
[34] Xu Chen,et al. Social-aware relay selection for cooperative networking: An optimal stopping approach , 2014, 2014 IEEE International Conference on Communications (ICC).
[35] Xinbing Wang,et al. Secrecy Capacity Scaling of Large-Scale Networks With Social Relationships , 2017, IEEE Transactions on Vehicular Technology.
[36] Huiming Wang,et al. Robust Joint Beamforming and Jamming for Secure AF Networks: Low-Complexity Design , 2015, IEEE Transactions on Vehicular Technology.
[37] Cecilia Mascolo,et al. Designing mobility models based on social network theory , 2007, MOCO.
[38] Tao Jiang,et al. Share communication and computation resources on mobile devices: a social awareness perspective , 2016, IEEE Wireless Communications.